2. ABSTRACT
Wireless sensor networks, due to their nature, are more
prone to security threats than other networks. Developments in WSNs
have led to the introduction of many protocols specially developed for
security purposes.
Most of these protocols are not efficient in terms of
putting an excessive computational and energy consumption burden on
small nodes in WSNs. This paper proposes a knowledge-based context-
aware approach for handling the intrusions generated by malicious
nodes.
3. CONT..
The system operates on a knowledge base, located at the
base station, which is used to store the events generated by the nodes
inside the network. The events are categorized and the cluster heads
(CHs) are acknowledged to block maliciously repeated activities
generated.
The CHs can also get informational records about the
maliciousness of intruder nodes by using their inference engines.
The mechanism of events logging and analysis by the base
station greatly affects the performance of nodes in the network by
reducing the extra security-related load on them
4. INTRODUCTION
The Wireless sensor networks (WSNs) are infrastructure-
less, distributed and dynamic in nature . The in richness capabilities of
the WSN change to area of emergence technologies. Fog computing has
an excellent example.
In order to satisfying mobility support, geo distribution,
locational awareness, and to low latency needs for the IoT applications,
the Fog node facilitates the user in the execution of IoT applications .
Due to the vulnerable nature of WSNs, these networks are
always exposed to severe types of threats which can vitiate their whole
functionality.
5. CONT..
Authentication protocols and secure routing protocols
implement the use of cryptographic keys to ensure secure transmission
of data but cannot give protection against the inside attacks knows as
passive attacks . These protocols scramble.
The valuable data from intruders who try to access them
from outside, but a passive attack from a node inside cannot be
avoided. According to Mehmood et al. [2], there are different types of
possible attacks on WSNs like routing attacks, Sybil attacks and denial
of service (DoS) etc.
6. EXISTING SYSTEM
Scalability issues, and knowledge sharing, and limited resources.
These challenges need to be carefully managed through optimized
algorithms, efficient resource allocation, and robust security protocols
Drawback
Resource allocation
Data loss
Message authentication not secure
7. PROPOSED SYSTEM
Proposes a knowledge-based context-aware approach for handling the intrusions
generated by malicious nodes. The system operates on a knowledge base, located at
the base station, which is used to store the events generated by the nodes inside the
network.
The events are categorized and the cluster heads (CHs) are acknowledged to
block maliciously repeated activities generated.
The CHs can also get informational records about the maliciousness of intruder
nodes by using their inference engines. The mechanism of events logging and analysis
by the base station greatly affects the performance of nodes in the network by
reducing the extra security-related
8. MODULES:
The sensor nodes
CHs are selected nodes
The monitored data
Security alerts.
The sensor nodes
The sensor nodes are installed in the network and grouped
together into clusters according to their locations and similarities.
9. CONT…
CHs are selected nodes
The CHs are selected among the nodes in the respective
clusters under some criteria. A blank knowledge base is installed on the
base station.
The CHs are provided with the inference engines for
using the knowledge base on the base station.
The CHs monitor all the node-related events and data
transmission in their clusters in such a way that all the nodes
communicate through their CH, directly or indirectly.
10. CONT..
The monitored data :
The monitored data is considered as events and sent to the
knowledge base on the base The base station analyzes the data to determine the
suspiciousness of The base station eliminates redundant and routine events
from the base station.
Security alerts:
The base station alerts the CHs about the pattern of threat events.
The CHs take action upon such alerts.
The CHs, upon receiving suspicious alerts, blacklist the generating
nodes and broadcast the information to their member nodes.
The CH may report some unknown event due to network conditions
which are analyzed at the base station.
11. REQUIREMENTS
HARDWARE REQUIREMENTS:
The hardware requirements may serve as the basis for
a contract for the implementation of the system and should therefore be
a complete and consistent specification of the whole system. They are
used by software engineers as the starting point for the system design.
It should what the system do and not how it should be implemented.
12. HARDWARE REQUIREMENTS:
PROCESSOR : PENTIUM IV 2.6 GHz, Intel Core 2 Duo.
RAM : 2 GB DD RAM
MONITOR : 15” COLOR
HARD DISK : 40 GB
CDDRIVE : LG 52X
KEYBOARD : WIRELESS KEYBOARD
MOUSE : WIRELESS MOUSE
13. REQUIREMENTS
SOFTWARE REQUIREMENTS:
The software requirements document is the specification of the system. It
should include both a definition and a specification of requirements. It is a set of what the
system should do rather than how it should do it.
The software requirements provide a basis for creating the software
requirements specification.
It is useful in estimating cost, planning team activities, performing tasks
and tracking the teams and tracking the team’s progress throughout the development
activity.
14. SOFTWARE REQUIREMENTS:
• Operating system : Windows 07/ XP Professional
• IDE :MS Visual studio
• Front End : .net
• Database :SQLserver
15. FUNCTIONAL REQUIREMENTS
A functional requirement defines a function of a software-system or its
component. A function is described as a set of inputs, the behavior, and outputs.
The proposed system is achieved by graphical pictures are used as passwords.
Graphical passwords essentially use images or representation of images as
passwords. Human brain is good in remembering picture than textual character.
user select image in our application and using shuffle button to randomly
relocate the viewport then selectfive places in that image (five click points) create
password
16. NON-FUNCTIONAL REQUIREMENTS
Content will be well organized. Each category of user will
have a different interface.
• The searching overhead will be drastically reduced as a result of
maintaining a separate discussion forum per subject for every class.
• Only the notifications relevant to a particular user will be delivered to the
user
19. CONCLUSION
Provided a critical examination of the IDS on CBWSN.
It is a system designed to remotely monitor and control a security
phenomenon by detecting anomaly attacks in a WSN using an IDS
model
The authors depicted an overview of CBWSN in
terms of key research areas, optimised clustering algorithm techniques
used in the related works, and the major network architectures.
We performed a comparative analysis of IDS based
on the NSL-KDD dataset as the popular benchmark dataset that
constitutes an appropriate proportion of normal network traffic flows
with several classes of attack.